Please turn on your JavaScript for this page to function normally.
Mac Trojan infects machines via unpatched Java bug

Flashback Trojan variants have been targeting Mac users since September 2011, and they have gone through a variety of changes and techniques aimed at achieving its …

Researchers link string of breaches to Chinese man

Security researchers rarely managed to trace hacking attacks back to a person or a specific entity, but it seems that Trend Micro experts have succeeded in tying a former …

Potential first Android bootkit spotted

Security researchers of US-based NQ Mobile have recently discovered what might be the first Android bootkit. Dubbed DKFBootKit, the malware piggybacks malicious payloads into …

1.5 million cards compromised in Global Payments breach

A massive breach of the processing system of Atlanta-based Global Payments has been confirmed by the company. “The company believes that the affected portion of its …

Metasploit: The Penetration Tester’s Guide

Metasploit Framework (MF), the open source tool for launching exploits against remote machines, is a well-loved instrument that allows penetration testers to automate routine …

How much does a 0-day vulnerability cost?

The market for exploits for zero-day vulnerabilities has exploded in the last year, says Adriel Desautels, the founder of Netragard, a penetration testing and vulnerability …

Fake eBay identity confirmation message hitting inboxes

Ebay users are once again targeted with fake notifications asking them to “confirm their identity”. “Dear eBay Community Member, You’re signing in from …

Facebook users targeted with account-hijacking Chrome extensions

With the steady rise in popularity of both Facebook and Google’s Chrome browser, cyber scammers have turned to targeting users of both. According to Kaspersky Lab expert …

Facebook set to change its privacy policy again

On March 15, Facebook published a draft of the changes that it plans to make to its Statement of Rights and Responsibilities, and asked users to comment on them. Among the …

Flash-based rogue AV targets users

The business of pushing rogue AV software onto unsuspecting users is quite lucrative, so it’s no wonder that cyber crooks are still doing it. But while most of the time …

Megaupload users targeted with extortion scheme

The recent shutdown of the Megaupload file hosting service by the US authorities is being actively exploited by cyber crooks who are attempting to extort money from the …

Call center employees are selling user information

Indian call center employees sell confidential data belonging to users for as little as $0.03, reports the Daily Mail. According to the news outlet, reporters from The Sunday …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools